The Wall Street Journal
Reshaping the Government Role
The Biden administration took office amid a rising tide of cyberattacks. Associate Deputy Attorney General John Carlin talks about the policies the administration is using to stem attacks and to help protect companies and consumers.
Next Animation Studio
At least 45,000 Android devices infected with unremovable malware
Researchers at cybersecurity firms Malwarebytes and Symantec have uncovered an Android trojan called xHelper that is able to reinstall itself even after users have uninstalled it.
IDG TECHtalk
How to tweak Windows logs to better investigate attacks
Default Windows event log settings won’t give you all the information you need to investigate security incidents. Here’s how to get the info you need.
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 10 Exam Question Review
IT systems are greatly affected by physical security. This episode presents a scenario in which only some security controls effectively mitigate a security problem. This clip is from the chapter "Physical Security" of the series "CompTIA...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Macro Malware
You will learn all about Macro malware, why they are so popular, having become a go-to means of infiltrating a computer in devastating fashion. You will also learn how to easily spot malicious macros, as well as protect yourself against...
Curated Video
Describe the different types of malware that could affect a computer system or network : Ransomware
From the section: Exploring Malware Functionalities. In this section, you learn how the behavior of malware is different in various classes of malware, and such an insight helps you to understand the class of malware while you are...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Securing Endpoints
In the enterprise, endpoint detection and response solutions report to a centralized SIEM solution when abnormal activity, including malware, is detected on hosts and devices. Intrusion detection and prevention systems (IDS/IPS) are the...
Curated Video
CompTIA Security+ Certification SY0-601: The Total Course - Chapter 11 Exam Question Review
Connecting to any Internet resource commonly uses DNS to resolve host names to IP addresses. In this episode, the viewer is presented with a DNS scenario and must determine which type of attack has occurred. This clip is from the chapter...
IDG TECHtalk
Setting up DLP features for email
Network World contributing editor David Strom provides a roundup of how to enable data leak prevention features on three email security platforms.
Curated Video
Bug Bounty Program Certification 6.6: Infect Complete Network Using Malwares
In this video, you will see how to infect entire network using malwares. • Learn about various network attacks • Explore the process of network infection techniques • Explanation of malware infection in network
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Apple Part I
You will learn about the general security around Apple computers. You will also learn why Apple operating systems can be very secure most of the time but can sometimes be just as insecure as other computers. In addition, you will be...
Curated Video
Bug Bounty Program Certification 13.5: Certification Exam Practice Questions – Part 4
Exam questions. • Practice questions • Solutions • Explanation of answer
Curated Video
Bug Bounty Program Certification 6.2: Find Major Bugs in Client Machines
This video will help you scan malwares using network vulnerability scanner. • Use malware scan using Nessus vulnerability scanner • Create a new malware scan and scan the client machines • Explanation about malware bugs in client machines
Packt
CompTIA Network+ Certification N10-007: The Total Course - Malware
This video explains the types of malware and what they do. This clip is from the chapter "Protecting Your Network" of the series "CompTIA Network+ Certification N10-007: The Total Course".In this section, you will learn how to protect...
Curated Video
CISSP® Certification Domain 3: Security Architecture and Engineering Video Boot Camp for 2022 - System vulnerabilities, threats, and countermeasures
CISSP Domain 7: Security Operations: System vulnerabilities, threats, and countermeasures. This clip is from the chapter "CISSP Domain 3: System Architecture and Engineering" of the series "CISSP® Certification Domain 3: Security...
Curated Video
AZ-104: Microsoft Azure Administrator Full Course - CSE-Lab
In this video, we will look at CSE-lab. This clip is from the chapter "Azure Virtual machines" of the series "AZ-104: Microsoft Azure Administrator Full Course".This section explains Azure compute and creating VM with PowerShell and...
IDG TECHtalk
Pegasus spyware and iPhone security
Amnesty International's Security Lab revealed that a handful of iPhones, mostly belonging to journalists and human rights activists, were successfully infected with Pegasus spyware. While the majority of iPhones users are not affected,...
Curated Video
The Beginners 2022 Cyber Security Awareness Training Course - Fake Antivirus
You will learn about fake antivirus, a very effective and successful method of socially engineering people into handing over their credit card details, by presenting them with fake anti-virus alerts. You will be visually presented with...
Next Animation Studio
Iranian hackers target corporate VPN servers
A new report by cyber security firm ClearSky has found that hackers backed by the Iranian government have been exploiting bugs in corporate VPN servers.
IDG TECHtalk
Guide to key Windows 10 event logs you need to monitor
These are the event logs that will help you identify malicious activity on your network.
Curated Video
Bug Bounty Program Certification 13.2: Bug Bounty Certification Exam Practice Questions – Part 1
Exam questions. • Practice questions • Solutions • Explanation of answer
IDG TECHtalk
Windows 10: Answers to your most important issues, Sept 24 | TECH(talk)
Computerworld contributor Preston Gralla and editor Ken Mingis have returned and are answering questions about Windows 10. If you have questions, feel free to post them in the comments to be featured in our next TECH(talk) about Windows 10.
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Post Exploitation Modules
This video introduces you to exploitation modules. This clip is from the chapter "System Hacking and Exploitation" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn how to hack and...
Curated Video
The Complete Ethical Hacking Bootcamp: Beginner To Advanced - Sending Malware with Spoofed Email
This video teaches you to send malware with spoofed emails. This clip is from the chapter "Developing a Brute Force Attacker" of the series "The Complete Ethical Hacking Bootcamp: Beginner To Advanced".In this section, you'll learn what...